A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
Cyber insurance is booming, but policies can leave businesses confused and many organizations struggle with the practical application of cyber insurance
IT environments are simply too complex and too dynamic for self-attestation, based on manual processes, to ever work. Without continuous monitoring to accurately assess compliance to cyber insurance requirements, organizations remain at risk.
Companies will need to take stock of their current processes for and the role of management in assessing, identifying and managing material risks of cybersecurity threats, as well as how the board provides oversight with respect to these risks.
The EU’s Digital Operational Resilience Act will come into force in just over a year, the majority of risk management professionals are only at the beginning of their planning journey. Kate Needham-Bennett of Fusion Risk Management explains how to get things moving
Lloyd’s produced the risk scenario in partnership with the Cambridge Centre for Risk Studies. The research explores nine hypothetical systemic risk scenarios to reveal the potential economic impact of each scenario across 107 countries and at three levels of severity
Continuously evaluating and updating your third-party risk assessment can improve your security posture and ensure your company doesn't have the next headline-making incident.
CISOs should consider a more values-oriented, socially informed approach to cyber risk as global conflict grows and many governments could change in key elections.
A 2023 report showed that just 5% of CISOs reported directly to the CEO. However, according to a new SEC rule, board members need to pay closer attention.
The use of generative AI promises to continue to grow rapidly. Consequently, leaders must understand the risks and challenges of this new technology and develop policies and practices to guide its usage.
A new study on the current state of cloud-native security found that a considerable number of cloud adopters do not understand the security risks of moving legacy applications to the cloud, opening themselves to a number of cloud-based attacks.
Whether a specific requirement or not, companies must either educate their board of directors in cybersecurity and risk management or look to recruit directors with specific cybersecurity experience to improve organizations' response and decision-making.
To get content containing either thought or leadership enter:
To get content containing both thought and leadership enter:
To get content containing the expression thought leadership enter:
You can enter several keywords and you can refine them whenever you want. Our suggestion engine uses more signals but entering a few keywords here will rapidly give you great content to curate.